Interconnections : (Record no. 6710)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06505cam a22002414a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780201634488 |
Terms of availability | TZS 49,920/= |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MUL |
Language of cataloging | eng. |
Description conventions | AACR |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.62 PER |
100 1# - MAIN ENTRY--AUTHOR NAME | |
Personal name | Perlman, Radia. |
245 10 - TITLE STATEMENT | |
Title | Interconnections : |
Sub Title | bridges, routers, switches, and internetworking protocols / |
Statement of responsibility, etc | Radia Perlman. |
250 ## - Edition Statement | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Reading, Mass. : |
Name of publisher | Addison Wesley, |
Year of publication | c2000. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xiii, 537 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes index. |
505 ## - Formatted Contents | |
Formatted contents note | Preface xi <br/>Roadmap to the Book xii <br/>Acknowledgments xii <br/> Essential Networking Concepts<br/> 1 (18)<br/> Layers<br/> 1 (6)<br/> Service Models<br/> 7 (2)<br/> Important Properties of a Network<br/> 9 (3)<br/> Reliable Data Transfer Protocols<br/> 12 (7)<br/> Data Link Layer Issues<br/> 19 (26)<br/> Generic LANs<br/> 19 (3)<br/> IEEE 802 LANs<br/> 22 (1)<br/> Names, Addresses, Routes<br/> 23 (2)<br/> LAN Addresses<br/> 25 (2)<br/> Multicast versus Unicast Addresses<br/> 27 (1)<br/> The Broadcast Address<br/> 28 (1)<br/> Multiplexing Field<br/> 29 (3)<br/> Bit Order<br/> 32 (2)<br/> Logical Link Control<br/> 34 (1)<br/> Issues in 802.3<br/> 35 (3)<br/> Issues in 802.5<br/> 38 (2)<br/> Packet Bursts<br/> 40 (1)<br/> Reasons for Bridges<br/> 40 (1)<br/> Point-to-Point Links<br/> 41 (4)<br/> Transparent Bridges<br/> 45 (50)<br/> The No-Frills Bridge<br/> 45 (2)<br/> The Learning Bridge<br/> 47 (11)<br/> Spanning Tree Algorithm<br/> 58 (5)<br/> Spanning Tree Algorithm Refinements<br/> 63 (14)<br/> Bridge Message Formats<br/> 77 (2)<br/> Other Bridge Issues<br/> 79 (8)<br/> Remote Bridges<br/> 87 (8)<br/> Source Routing Bridges<br/> 95 (32)<br/> Pure Source Routing<br/> 96 (8)<br/> SR-TB Bridges<br/> 104 (4)<br/> SRT Bridges<br/> 108 (1)<br/> End-system Algorithms<br/> 109 (7)<br/> Source Routing versus Transparent Bridging<br/> 116 (3)<br/> Ideas for Improving Source Route Bridging<br/> 119 (8)<br/> Hubs, Switches, Virtual LANs, and Fast Ethernet<br/> 127 (18)<br/> Hubs<br/> 127 (5)<br/> Faster LANs<br/> 132 (2)<br/> Virtual LANs (VLANs)<br/> 134 (11)<br/> Network Interface: Service Models<br/> 145 (8)<br/> What Is the Network Layer?<br/> 145 (1)<br/> Network Service Types<br/> 146 (7)<br/> Connection-oriented Nets: X.25 and ATM<br/> 153 (26)<br/> Generic Connection-oriented Network<br/> 153 (2)<br/> X.25: Reliable Connection-oriented Service<br/> 155 (12)<br/> Implementing X.25 Inside the Net<br/> 167 (1)<br/> Asynchronous Transfer Mode<br/> 168 (11)<br/> Generic Connectionless Service<br/> 179 (10)<br/> Data Transfer<br/> 179 (1)<br/> Addresses<br/> 180 (1)<br/> Hop Count<br/> 180 (1)<br/> Service Class Information<br/> 181 (2)<br/> Network Feedback<br/> 183 (1)<br/> Fragmentation and Reassembly<br/> 183 (2)<br/> Maximum Packet Size Discovery<br/> 185 (4)<br/> Network Layer Addresses<br/> 189 (32)<br/> Hierarchical Addresses with Fixed Boundaries<br/> 190 (2)<br/> Hierarchical Addresses with Flexible Boundaries<br/> 192 (1)<br/> Owning versus Renting Addresses<br/> 193 (1)<br/> Types of Addresses<br/> 194 (1)<br/> IP<br/> 194 (5)<br/> IPX<br/> 199 (4)<br/> IPX+<br/> 203 (1)<br/> IPv6<br/> 204 (7)<br/> CLNP Network Layer Addresses<br/> 211 (4)<br/> AppleTalk Network Layer Addresses<br/> 215 (1)<br/> DECnet Phases III and IV<br/> 216 (2)<br/> NAT/NAPT<br/> 218 (3)<br/> Connectionless Data Packet Formats<br/> 221 (44)<br/> Pieces of a Connectionless Network Layer<br/> 221 (1)<br/> Data Packets<br/> 222 (1)<br/> Summary of Packet Formats for Easy Reference<br/> 222 (8)<br/> Technical Issues and Comparisons in Data Packet Formats<br/> 230 (20)<br/> Source Routing<br/> 250 (3)<br/> The Great IPX Frame Format Mystery<br/> 253 (3)<br/> Error Reports and Other Network Feedback to the Endnode<br/> 256 (9)<br/> Neighbor Greeting and Autoconfiguration<br/> 265 (34)<br/> Endnodes Attached via Point-to-Point Links<br/> 266 (1)<br/> Endnodes Attached via LANs<br/> 267 (17)<br/> Endnodes Attached via Nonbroadcast Multiaccess Media<br/> 284 (9)<br/> Finding Things<br/> 293 (6)<br/> Routing Algorithm Concepts<br/> 299 (48)<br/> Distance Vector Routing<br/> 299 (8)<br/> Link State Routing<br/> 307 (13)<br/> Comparison of Link State and Distance Vector Routing<br/> 320 (5)<br/> Load Splitting<br/> 325 (1)<br/> Link Costs<br/> 326 (2)<br/> Migrating Routing Algorithms<br/> 328 (3)<br/> LANs<br/> 331 (3)<br/> Types of Service<br/> 334 (7)<br/> Partition Repair: Level I Subnetwork Partition<br/> 341 (6)<br/> Fast Packet Forwarding<br/> 347 (20)<br/> Using an Additional Header<br/> 347 (1)<br/> Address Prefix Matching<br/> 348 (2)<br/> Longest Prefix Match with Trie<br/> 350 (11)<br/> Binary Search<br/> 361 (6)<br/> Specific Routing Protocols<br/> 367 (82)<br/> A Brief History of Intradomain Routing Protocols<br/> 367 (2)<br/> RIP<br/> 369 (3)<br/> RTMP, IPX-RIP, and DECnet<br/> 372 (1)<br/> IS-IS, OSPF, NLSP, and PNNI<br/> 373 (52)<br/> Interdomain Routing Protocols<br/> 425 (24)<br/> WAN Multicast<br/> 449 (30)<br/> Introduction<br/> 449 (4)<br/> Multicast in IP<br/> 453 (26)<br/> Sabotage-proof Routing<br/> 479 (14)<br/> The Problem<br/> 480 (1)<br/> All You Need to Know about Cryptography<br/> 480 (2)<br/> Overview of the Approach<br/> 482 (2)<br/> Detailed Description of the Approach<br/> 484 (7)<br/> Summary<br/> 491 (1)<br/> For Further Reading<br/> 491 (2)<br/> To Route, Bridge, or Switch: Is That the Question?<br/> 493 (10)<br/> Switches<br/> 493 (1)<br/> Bridges versus Routers<br/> 493 (3)<br/> Extensions to Bridges<br/> 496 (2)<br/> Extensions to Routers<br/> 498 (5)<br/> Protocol Design Folklore<br/> 503 (20)<br/> Simplicity versus Flexibility versus Optimality<br/> 503 (2)<br/> Knowing the Problem You're Trying to Solve<br/> 505 (1)<br/> Overhead and Scaling<br/> 506 (1)<br/> Operation Above Capacity<br/> 506 (1)<br/> Compact IDs versus Object Identifiers<br/> 507 (1)<br/> Optimizing for the Most Common or Important Case<br/> 507 (1)<br/> Forward Compatibility<br/> 508 (5)<br/> Migration: Routing Algorithms and Addressing<br/> 513 (1)<br/> Parameters<br/> 514 (3)<br/> Making Multiprotocol Operation Possible<br/> 517 (1)<br/> Running over Layer 3 versus Layer 2<br/> 518 (1)<br/> Robustness<br/> 519 (1)<br/> Determinism versus Stability<br/> 520 (1)<br/> Performance for Correctness<br/> 521 (1)<br/> In Closing<br/> 521 (2)<br/>Glossary 523 (10)<br/>Index 533 |
520 ## - SUMMARY, ETC. | |
Summary, etc | A text on networking theory and practice, providing information on general networking concepts, routing algorithms and protocols, addressing, and mechanics of bridges, routers, switches, and hubs. Describes all major network algorithms and protocols in use today, and explores engineering trade-offs that each different approach represents. Includes chapter homework problems and a glossary. This second edition is expanded to cover recent developments such as VLANs, Fast Ethernet, and AppleTalk. The author is a Distinguished Engineer at Sun Microsystems, Inc., and holds some 50 patents |
546 ## - LANGUAGE NOTE | |
Language note | eng. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Routers (Computer networks) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer network protocols. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Local area networks (Computer networks) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Bridges (Computer networks) |
942 ## - ADDED ENTRY ELEMENTS | |
Item type | Book |
Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Date acquired | Source of acquisition | Full call number | Accession Number | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Mzumbe University Main Campus Library | Mzumbe University Main Campus Library | 10/31/2012 | Seif school | 004.62 PER | 0072214 | 1 | 12/10/2022 | Book | ||||
Mzumbe University Main Campus Library | Mzumbe University Main Campus Library | 10/31/2012 | Seif school | 004.62 PER | 0072215 | 2 | 12/10/2022 | Book | ||||
Mzumbe University Main Campus Library | Mzumbe University Main Campus Library | 10/31/2012 | Seif school | 004.62 PER | 0072216 | 3 | 12/10/2022 | Book | ||||
Mzumbe University Main Campus Library | Mzumbe University Main Campus Library | 10/31/2012 | Seif school | 004.62 PER | 0072217 | 4 | 12/10/2022 | Book |